<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1678611822423757&amp;ev=PageView&amp;noscript=1">

6 Data Security Tips for State and Local Government Agencies

Greg Mooney| May 18 2020

| security, Government, ransomware

The sense of urgency around cybersecurity is reaching a whole new level for state and local governments.

Things were already in pretty rough shape, as noted by the State and Local Cybersecurity Collaboration report co-authored by the National Association of State Chief Information Officers and the National Governors Association. The report shows how the majority of all publicized ransomware attacks in the United States have targeted local governments. Some, like the August 2019 Texas Cyber Incident, the attack on Louisiana public schools, and the Baltimore cyber disruption, have been well-publicized. But most incidents are publicly unknown.

With the arrival of COVID19, people are desperate to get any state and local aid they can to tide them over until the economy returns to normal. States and cities are thus stretching the capabilities of their IT infrastructures even further to enable citizens to interact online with agency staffs working from home securely. Hackers see this as an opportunity to exploit the stay-at-home mandates—taking advantage of families and government personnel who don’t have strong security measures in place on their home networks.

 

Longtime Favorite Targets of Cybercriminals

State and city IT infrastructures have long been targets for two primary reasons. They store valuable personal information on citizens that cybercriminals can leverage for identity theft and financial fraud. And in many cases, the IT infrastructures simply aren’t protected. Cybercriminals love to go after the lowest-hanging fruit.

The need to store personal information will never go away—that’s a big part of what state and local governments need to do as they deliver services. Weak security postures at least have the potential of being fortified. But many governments are defenseless because IT budgets take a back seat to critical citizen services. There just isn’t enough money left over for investing in the necessary technology, processes, expertise, and resources. 

As a result, many state and local government IT infrastructures operate with older technology that can’t contend with today’s sophisticated cyberattacks. In some cases, systems have reached end-of-life support so that their vendors are no longer issuing security patches. Hardware and software systems are left wide open to attacks. 

6 Low-Cost Tips to Help State and Local Governments Improve Security 

But there are some relatively low-cost measures that state and city IT teams can consider. Here are six that are sure to strengthen your current security posture:

  1. Designate Responsibility—find at least one person who will assume the responsibility for cybersecurity and determine the budget and resources they have to work with. Even if the latitude you give them is narrow in terms of how much they can do, at least you’ve got someone who is always thinking about getting the most out of whatever resources you have. 
  2. Document and Measure—Answers to IT security problems sometimes reveal themselves simply by taking inventory of all your hardware and software and then documenting security incidents that occur. You just might pick up a pattern that tells you which remedy to apply. 
  3. Simplify—The more complex your IT infrastructure, the more difficult it is to defend. Simplifying your environment makes it easier to not only create a stronger security posture but also maintain it as new cyberattack methods evolve. A simplified environment may even cost you less—perhaps creating a bigger budget for security!
  4. Talk to Colleagues—Network with IT colleagues from other states and cities. You face similar issues and have probably applied similar solutions that have either worked well or not worked well. Either way, you have a lot of knowledge that can benefit each other. Maybe form a virtual round-table of five or so colleagues that meet once a month. 
  5. Talk to Employees—End-users know much about what is going on in your network, and they may be able to help you identify risks. They are also the path through which many cyberattacks occur—such as clicking on malicious links and attachments. Getting their input and educating them on what not to do will go a long way to improving security.
  6. Borrow Best Practices—There’s a lot online about security best practices that are available for free. A good place to start is NIST. You may also be able to emulate policies and processes used by your third-party partners—they want their IT ecosystems to have strong postures just as much as you do. 

If you’re on the IT team of a state or local government, one thing that you do have in your favor when it comes to cybersecurity is that you are on a very large playing field along with all other state and local governments. Hackers have many targets to choose from, and they will look for government entities with the weakest security postures. If your defenses are a little stronger than your neighbor’s, you just might avoid that lurking burglar!

A Handy Tool for Securing Files

A tool that state and local governments can use to improve their security postures is MOVEit Managed File Transfer (MFT) from Progress. Organizations around the world use MOVEit to protect files in-transit and at-rest to assure the reliability of core business processes and to secure compliant transfers of sensitive data among employees, customers, and partners. MOVEit also provides IT teams with complete visibility and control over file-transfer activities. If your organization is looking to securely and easily send files, you can start a free trial of MOVEit today.  

 

Topics: security, Government, ransomware

Leave a Reply

Your email address will not be published. Required fields are marked *

THIS POST WAS WRITTEN BY Greg Mooney

Greg is a technologist and data geek with over 10 years in tech. He has worked in a variety of industries as an IT manager and software tester. Greg is an avid writer on everything IT related, from cyber security to troubleshooting.

Free Trials

Getting started has never been easier. Download a trial today.

Download Free Trials

Contact Us

Let us know how we can help you. Focus on what matters. 

Send us a note

Subscribe to our Blog

Let’s stay in touch! Register to receive our blog updates.